scholarly journals Airports’ Crisis Management Processes and Stakeholders Involved

2020 ◽  
Vol 3 (1) ◽  
Author(s):  
Vasiliki Mantzana ◽  
Eftichia Georgiou ◽  
Ioannis Chasiotis ◽  
Ilias Gkotsis ◽  
Tim H. Stelkens-Kobsch ◽  
...  

Airports are exposed to various physical incidents that can be classified as aviation and non-aviation related incidents, including terrorist attacks, bombings, natural disasters (e.g. earthquake or tsunami and man-made disasters such as terrorist attacks) etc. (Kanyi, Kamau, & Mireri, 2016). In addition to this, cyber-attacks to airport operations are emerging especially with the increasing use of Information Systems (IS), such as electronic tags for baggage handling and tracking, remote check-in, smart boarding gates, faster and more reliable security screening technologies and biometric immigration controls etc. Any physical or cyber incident that causes loss of infrastructure or massive patient surge, such as natural disasters, terrorist acts, or chemical, biological, radiological, nuclear, or explosive hazards could affect the airports’ services provision and could cause overwhelming pressure. During the crisis management, several stakeholders that have different needs and requirements, get involved in the process, trying to cooperate, respond and support recovery and impact mitigation. The aim of this paper is to present a holistic security agenda that defines the stakeholders involved in the respective processes followed during the crisis management cycle. This agenda is based both on normative literature, such as relevant standards, guidelines, and practices and on knowledge and feedback extrapolated from a case study conducted in the context of the SATIE project (H2020-GA832969).  In meeting paper’s aim, initially the normative review of the phases of the crisis management cycle (preparedness, response, recovery and mitigation) in the context of airports as well as general practices applied, are presented. Moreover, the key airport stakeholders and operation centres involved in airports operations, as well as during the crisis management are analysed. By combining the information collected, a holistic cyber and physical crisis management cycle including the stakeholders and the relevant processes are proposed. The crisis management process is taken into consideration into the SATIE project, which aims to build a security toolkit in order to protect critical air transport infrastructures against combined cyber-physical threats. This toolkit will rely on a complete set of semantic rules that will improve the interoperability between existing systems and enhanced security solutions, in order to ensure more efficient threat prevention, threat and anomaly detection, incident response and impact mitigation, across infrastructures, populations and environment.

2021 ◽  
Vol 11 (9) ◽  
pp. 4298
Author(s):  
Alissa Kain ◽  
Douglas L. Van Bossuyt ◽  
Anthony Pollman

Military bases perform important national security missions. In order to perform these missions, specific electrical energy loads must have continuous, uninterrupted power even during terrorist attacks, adversary action, natural disasters, and other threats of specific interest to the military. While many global military bases have established microgrids that can maintain base operations and power critical loads during grid disconnect events where outside power is unavailable, many potential threats can cause microgrids to fail and shed critical loads. Nanogrids are of specific interest because they have the potential to protect individual critical loads in the event of microgrid failure. We present a systems engineering methodology that analyzes potential nanogrid configurations to understand which configurations may improve energy resilience and by how much for critical loads from a national security perspective. This then allows targeted deployment of nanogrids within existing microgrid infrastructures. A case study of a small military base with an existing microgrid is presented to demonstrate the potential of the methodology to help base energy managers understand which options are preferable and justify implementing nanogrids to improve energy resilience.


Author(s):  
Tetiana Veretenko ◽  
Anton Trebe ◽  
Olena Bieloliptseva

The attention is drawn to the possibility of terrorist attacks in Ukraine. The essence of safe behaviour during a terrorist attack is revealed in the article. The purpose of the article is to determine the rules of behaviour for high school students in the case of a terrorist attack, the action algorithm of high school students on receiving information about a terrorist threat; rules of safe behaviour in social networks, which are actively used by terrorists, who attack high school students to participate in their groups and terrorist acts; to present a formation program of high school students’safe behaviour while terrorist attacks and show its effectiveness.The results of the experimental implementation of the program for formation of high school students’safe behaviour during terrorist attacks and emergencies are analyzed after asurvey carried out. According to the results summarised a conclusion is made to activate social and pedagogical work in the field of forming students’safe behaviour while terrorist attacks and emergencies.


2018 ◽  
Vol 1 (2) ◽  
pp. 135-148
Author(s):  
Nicoletta Varani ◽  
Enrico Bernardini

Abstract Tourism remains a very vulnerable sector and sensitive to both internal and external impacts, such as economic and social crises, natural disasters, epidemics and diseases, national and international conflicts. Among these, the most alarming threat in the 21st century remains terrorism. In this sense, this paper aims to study the effects of the increasingly frequent terrorist attacks by the extremist factions of Al-Qaeda and ISIL on the tourism industry in the Mediterranean Region. The contribution, after having discussed in general the tourism market in the Mediterranean Region, intends to highlight the impacts and repercussions of the terrorist attacks on tourism, presenting the example of Egypt and one of its best-known tourist destinations, Sharm el-Sheikh. In this sense, it is shown how, in a few years, the political instability of the country and the attacks of 2005 and 2016 have significantly reduced the influx of tourists, transforming it from one of the most visited destinations in the world in a place of increasing abandonment.


The architecture of the smart grid combines the communication grid and physical power grid in a sole huge network. Smart grid has various security threats like cyber-attacks, physical attacks or natural disasters. The mentioned threats can lead to the breach of the user’s privacy, failure of the infrastructure, energy theft, blackouts endanger the safety of the operators among many more. For this reason, there is need to ensure that the smart grid cyber security is adequate to prevent any of these threats. Adequate security will as well ensure that the smart grid operates adequately as it is viewed that is by providing safe, reliable and uninterrupted supply of power to the consumers with a regular flow of end to end information that are all secure. The smart grid environment will ensure that the electric power infrastructure is modern. This is majorly by combining the present functionalities and the future ones with the upgraded requirements to the users


Author(s):  
Vesna Poposka

Referring to the cyber space as the new dimension of warfare opens many legal challenges. Those challenges can be settled in two main clusters: first one related to the usage of cyberspace as a weapon itself, related the environment in which terrorist attack occurs (meaning that cyber infrastructure and cyber are used for terrorist attacks, or as an asset during counterterrorist operations), and the second drives on ancillary usage of the cyber infrastructure, means and methods for the same purposes. The cyberspace is lacking specific legal regime that is applicable, same as cyber attacks. While the specific applicable regime is lacking, as well as any consensus upon that issue, what has to be considered is if any parts of the currently ongoing legal regimes are applicable. Put into the context of cyber warfare, it can lead to different solutions, examined in the chapter.


2020 ◽  
Vol 3 (3) ◽  
pp. 197-209 ◽  
Author(s):  
Donald Blondin ◽  
Arjen Boin

Abstract The nation state is discovering the limits of its crisis management capacities. The Ebola and Zika outbreaks, the financial crisis, the downing of flight MH17 over Ukraine, sinking ships overfilled with refugees, cyber-attacks, urban terrorism and existential environmental threats serve as strong reminders of the complex origins and transboundary dimensions of many contemporary crises and disasters. As these transboundary aspects of modern crises become increasingly manifest, the need for international, collaborative responses appears ever clearer. But that collaboration does not always emerge in time (or at all). Even in the European Union, which has various transboundary crisis management mechanisms in place, the willingness to initiate joint crisis responses varies. This observation prompted our research question: Why do states collaborate in response to some transboundary crises but not others? We bring together the crisis and collective action literatures to formulate a theoretical framework that can help answer this question. This article identifies crucial factors that facilitate a possible pathway toward a joint response.


Sign in / Sign up

Export Citation Format

Share Document